SlideShare a Scribd company logo
1 of 94
Disks and File Systems Chapter 8
Chapter Goals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Drives 101 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Drives 101 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Partitions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Partitions ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Interfaces ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object]
IDE ,[object Object],[object Object],[object Object],[object Object],[object Object]
IDE ,[object Object],[object Object]
Fibre Channel ,[object Object],[object Object],[object Object],[object Object],[object Object]
Fibre Channel ,[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Subsystems
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
General Checklist for Adding a Disk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Adding an SCSI Disk to the System ,[object Object],[object Object],[object Object],[object Object]
Adding an IDE Disk to the System ,[object Object],[object Object],[object Object]
NAS AND SAN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NAS AND SAN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Utilities ,[object Object],[object Object],[object Object],[object Object]
Utilities ,[object Object],[object Object],[object Object]
Windows File systems ,[object Object],[object Object],[object Object],[object Object]
Windows File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Windows File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Windows File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Windows File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Windows File systems ,[object Object],[object Object],[object Object]
Windows File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Windows File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UNIX File systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
UNIX File systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
UNIX File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UNIX File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
UNIX File systems ,[object Object],[object Object]
UNIX File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Linux File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Linux File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating UNIX File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working with the newfs Command ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working with the newfs Command ,[object Object],[object Object],[object Object],[object Object],[object Object]
How newfs   Connects to mkfs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mounting File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mounting File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mounting File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mounting File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mounting File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mounting File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

What's hot (20)

Linux filesystemhierarchy
Linux filesystemhierarchyLinux filesystemhierarchy
Linux filesystemhierarchy
 
101 2.1 design hard disk layout v2
101 2.1 design hard disk layout v2101 2.1 design hard disk layout v2
101 2.1 design hard disk layout v2
 
How to design a file system
How to design a file systemHow to design a file system
How to design a file system
 
Linux lecture5
Linux lecture5Linux lecture5
Linux lecture5
 
Aties Presentation
Aties PresentationAties Presentation
Aties Presentation
 
2.1 design hard disk layout v2
2.1 design hard disk layout v22.1 design hard disk layout v2
2.1 design hard disk layout v2
 
Writing Character driver (loadable module) in linux
Writing Character driver (loadable module) in linuxWriting Character driver (loadable module) in linux
Writing Character driver (loadable module) in linux
 
11 linux filesystem copy
11 linux filesystem copy11 linux filesystem copy
11 linux filesystem copy
 
File Systems
File SystemsFile Systems
File Systems
 
Ch04
Ch04Ch04
Ch04
 
Input output in linux
Input output in linuxInput output in linux
Input output in linux
 
Basics of Linux Commands, Git and Github
Basics of Linux Commands, Git and GithubBasics of Linux Commands, Git and Github
Basics of Linux Commands, Git and Github
 
Lpi lição 01 exam 102 objectives
Lpi lição 01  exam 102 objectivesLpi lição 01  exam 102 objectives
Lpi lição 01 exam 102 objectives
 
Lecture 5 Kernel Development
Lecture 5 Kernel DevelopmentLecture 5 Kernel Development
Lecture 5 Kernel Development
 
Mca ii os u-5 unix linux file system
Mca  ii  os u-5 unix linux file systemMca  ii  os u-5 unix linux file system
Mca ii os u-5 unix linux file system
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
 
Embedded_Linux_Booting
Embedded_Linux_BootingEmbedded_Linux_Booting
Embedded_Linux_Booting
 
Linux Booting Steps
Linux Booting StepsLinux Booting Steps
Linux Booting Steps
 
linux file system
linux file systemlinux file system
linux file system
 
Linux file system
Linux file systemLinux file system
Linux file system
 

Viewers also liked (20)

Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networks
 
Excel 2007 Unit C
Excel 2007 Unit CExcel 2007 Unit C
Excel 2007 Unit C
 
Drink Water To Your Health
Drink Water To Your HealthDrink Water To Your Health
Drink Water To Your Health
 
Ch08
Ch08Ch08
Ch08
 
Excel 2007 Unit P
Excel 2007 Unit PExcel 2007 Unit P
Excel 2007 Unit P
 
Ch24 system administration
Ch24 system administration Ch24 system administration
Ch24 system administration
 
Beat Anger
Beat AngerBeat Anger
Beat Anger
 
Chapter11 -- networking with tcpip and the internet
Chapter11  -- networking with tcpip and the internetChapter11  -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internet
 
Ch05 system administration
Ch05 system administration Ch05 system administration
Ch05 system administration
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
Ch24
Ch24Ch24
Ch24
 
Indiansoldiers
IndiansoldiersIndiansoldiers
Indiansoldiers
 
Chapter12 Managing And Implementing Backups And Disaster Recovery
Chapter12     Managing And Implementing Backups And Disaster RecoveryChapter12     Managing And Implementing Backups And Disaster Recovery
Chapter12 Managing And Implementing Backups And Disaster Recovery
 
Ch01
Ch01Ch01
Ch01
 
Ramadan 2008
Ramadan 2008Ramadan 2008
Ramadan 2008
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
 
Ch22 system administration
Ch22 system administration Ch22 system administration
Ch22 system administration
 
Ch23 system administration
Ch23 system administration Ch23 system administration
Ch23 system administration
 
Ch21 system administration
Ch21 system administration Ch21 system administration
Ch21 system administration
 
Ch10 system administration
Ch10 system administration Ch10 system administration
Ch10 system administration
 

Similar to Ch08 system administration

Similar to Ch08 system administration (20)

Introduction to Hard Disk Drive by Vishal Garg
Introduction to Hard Disk Drive by Vishal GargIntroduction to Hard Disk Drive by Vishal Garg
Introduction to Hard Disk Drive by Vishal Garg
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Hard disk
Hard diskHard disk
Hard disk
 
Disk structure
Disk structureDisk structure
Disk structure
 
Disk Management
Disk ManagementDisk Management
Disk Management
 
Disk Management.pdf
Disk Management.pdfDisk Management.pdf
Disk Management.pdf
 
Hard Disk Data Recovery Basics -Raminfotech
Hard Disk Data Recovery Basics -RaminfotechHard Disk Data Recovery Basics -Raminfotech
Hard Disk Data Recovery Basics -Raminfotech
 
Asif Jamal disk (it)
Asif Jamal disk (it)Asif Jamal disk (it)
Asif Jamal disk (it)
 
OSCh14
OSCh14OSCh14
OSCh14
 
OS_Ch14
OS_Ch14OS_Ch14
OS_Ch14
 
Ch14 OS
Ch14 OSCh14 OS
Ch14 OS
 
Storage System and Backup Media
Storage System and Backup MediaStorage System and Backup Media
Storage System and Backup Media
 
1.1 storage device
1.1  storage device1.1  storage device
1.1 storage device
 
Computer with terms
Computer with termsComputer with terms
Computer with terms
 
Chapter 7: Basic Disk Drives
Chapter 7: Basic Disk DrivesChapter 7: Basic Disk Drives
Chapter 7: Basic Disk Drives
 
Hard disk PPT
Hard disk PPTHard disk PPT
Hard disk PPT
 
Chapter 12 - Mass Storage Systems
Chapter 12 - Mass Storage SystemsChapter 12 - Mass Storage Systems
Chapter 12 - Mass Storage Systems
 
Operation System
Operation SystemOperation System
Operation System
 
Hard Disk Componets
Hard Disk ComponetsHard Disk Componets
Hard Disk Componets
 
Ch12
Ch12Ch12
Ch12
 

More from Raja Waseem Akhtar

Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its toolsRaja Waseem Akhtar
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking securityRaja Waseem Akhtar
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problemsRaja Waseem Akhtar
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networkingRaja Waseem Akhtar
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linuxRaja Waseem Akhtar
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networkingRaja Waseem Akhtar
 
Chapter07 -- wa ns and remote connectivity
Chapter07  -- wa ns and remote connectivityChapter07  -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivityRaja Waseem Akhtar
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methodsRaja Waseem Akhtar
 
Chapter05 -- networking hardware
Chapter05  -- networking hardwareChapter05  -- networking hardware
Chapter05 -- networking hardwareRaja Waseem Akhtar
 

More from Raja Waseem Akhtar (20)

The prophet's wives
The prophet's wivesThe prophet's wives
The prophet's wives
 
God is Great
God is GreatGod is Great
God is Great
 
Namaz ka tareeqa
Namaz ka tareeqaNamaz ka tareeqa
Namaz ka tareeqa
 
Aayat ul qursi
Aayat ul qursiAayat ul qursi
Aayat ul qursi
 
2ªwwii how did it fought
2ªwwii how did it fought2ªwwii how did it fought
2ªwwii how did it fought
 
Fun with EMC2
Fun with EMC2Fun with EMC2
Fun with EMC2
 
Jerusalm at night.pps
Jerusalm at night.ppsJerusalm at night.pps
Jerusalm at night.pps
 
From the sky
From the skyFrom the sky
From the sky
 
Discover the discovery
Discover the discoveryDiscover the discovery
Discover the discovery
 
Solaris servers sec
Solaris servers secSolaris servers sec
Solaris servers sec
 
The OSI - seven layers
The OSI  - seven layersThe OSI  - seven layers
The OSI - seven layers
 
Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its tools
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networking
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linux
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
 
Chapter07 -- wa ns and remote connectivity
Chapter07  -- wa ns and remote connectivityChapter07  -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivity
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
 
Chapter05 -- networking hardware
Chapter05  -- networking hardwareChapter05  -- networking hardware
Chapter05 -- networking hardware
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Ch08 system administration

  • 1. Disks and File Systems Chapter 8
  • 2.
  • 3.  
  • 4.
  • 5.
  • 6.  
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.  
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. SCSI
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. SCSI
  • 33.
  • 34.  
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.  
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.  
  • 66.
  • 67.
  • 68.  
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.

Editor's Notes

  1. Need pictures here!!!
  2. If the bad spot is located on a cylinder which contains a “free” alternate sector, this is the preferred location to map the bad block. The drive electronics do not have to move the heads in this case. The only “penalty” is the delay caused by the rotational latency of the platter. On the other hand, if there is no free alternate sector on the same cylinder as the bad spot, there are penalties to be paid. The drive electronics have to move the heads to an alternate cylinder, and then write the data into the alternate location. The original bad spot has to be marked bad, and a table has to be updated to point to the new “alternate” location for the data from that sector. Every time the file is accessed, this penalty is paid.
  3. UPDATE THIS
  4. Pictures of the different raid levels!
  5. Add windows stuff here
  6. The entries in the table are created on a first-come, first-serve basis; there is no overlying structure to the table! The default size of the disk clusters is determined by the size of the partition. The minimum cluster size is 1 sector/cluster (512 bytes) for small (32 MB or smaller) partitions. The largest cluster size is 128 sectors (64 Kbytes) for large (2,048 to 4,096 MB) partitions. The operator can tune the cluster size using the format command with the /a:size switch when invoking format.
  7. Some UNIX variants also provide ufs logging. A file system that employs ufs logging is more fault tolerant than a standard ufs file system. The ufs logging feature allocates 1 megabyte of file system space per gigabyte of file system for use as a transaction log. The system disk driver writes all transactions to the log. Once the ufs log has been written, the driver considers the transaction complete. The information in the ufs log is written to the file system at a later time. Consult the manual page for mount_ufs for more information on ufs logging, and how to configure/enable it for specific versions of UNIX.
  8. Some UNIX variants also provide ufs logging. A file system that employs ufs logging is more fault tolerant than a standard ufs file system. The ufs logging feature allocates 1 megabyte of file system space per gigabyte of file system for use as a transaction log. The system disk driver writes all transactions to the log. Once the ufs log has been written, the driver considers the transaction complete. The information in the ufs log is written to the file system at a later time. Consult the manual page for mount_ufs for more information on ufs logging, and how to configure/enable it for specific versions of UNIX.
  9. Some UNIX variants also provide ufs logging. A file system that employs ufs logging is more fault tolerant than a standard ufs file system. The ufs logging feature allocates 1 megabyte of file system space per gigabyte of file system for use as a transaction log. The system disk driver writes all transactions to the log. Once the ufs log has been written, the driver considers the transaction complete. The information in the ufs log is written to the file system at a later time. Consult the manual page for mount_ufs for more information on ufs logging, and how to configure/enable it for specific versions of UNIX.
  10. Some UNIX variants also provide ufs logging. A file system that employs ufs logging is more fault tolerant than a standard ufs file system. The ufs logging feature allocates 1 megabyte of file system space per gigabyte of file system for use as a transaction log. The system disk driver writes all transactions to the log. Once the ufs log has been written, the driver considers the transaction complete. The information in the ufs log is written to the file system at a later time. Consult the manual page for mount_ufs for more information on ufs logging, and how to configure/enable it for specific versions of UNIX.
  11. Minix: the original Linux file system.     Ext: The Extended file system ( ext ) was the replacement for the Minix file system on Linux. The ext file system came with a new concept: the virtual file system ( vfs ) driver. The vfs code allows the real file systems to interface with the kernel via an application-programming interface. This greatly simplified the task of porting new file systems to the Linux environment.     Ext2: The Second Extended file system ( ext2 ) eventually replaced the ext file system on Linux. The ext2 file system continues to be the mainstay file system for Linux systems. Although it is similar to the ufs file system, it contains several modifications that improve performance and reliability of the overall file system.     Ext3: The most recent version of the ext file system under Linux. Ext3 adds a configurable level of journaling to the features of the ext2 file system.     Xia: The successor to the Minix file system. The Linux implementation allows Linux and Minim [Author: Minix?]to share files.     Umsdos: A Linux version of the DOS file system. This file system provides additional structures for supporting file ownership, and security information for DOS file systems.     Msdos: An implementation of the Microsoft DOS file system without the Linux extensions.     Vfat: A Linux implementation of the Windows FAT file system.     Proc: Refer to the UNIX file system section for information on the proc file system.     Smb: The Microsoft Server Message Block file system for Linux. This file system allows Linux to mount Microsoft SMB file systems.     Ncp: A Linux implementation of the Novel Client Protocol that allows Linux to mount Novel Netware file systems.     Iso9660: The Linux implementation of the ISO9660 file system used by most CDs.     Sysv: The Linux implementation of the original System V UNIX file system. Not used often.     Hpfs: The Linux implementation of the High Performance File System, allowing Linux to mount OS/2 hpfs partitions.     Affs: The Linux implementation of the Amiga fast file system that allows Linux and Amiga systems to share files.     Ufs: Refer to the UNIX file systems section for information on the ufs file system.
  12. Minix: the original Linux file system.     Ext: The Extended file system ( ext ) was the replacement for the Minix file system on Linux. The ext file system came with a new concept: the virtual file system ( vfs ) driver. The vfs code allows the real file systems to interface with the kernel via an application-programming interface. This greatly simplified the task of porting new file systems to the Linux environment.     Ext2: The Second Extended file system ( ext2 ) eventually replaced the ext file system on Linux. The ext2 file system continues to be the mainstay file system for Linux systems. Although it is similar to the ufs file system, it contains several modifications that improve performance and reliability of the overall file system.     Ext3: The most recent version of the ext file system under Linux. Ext3 adds a configurable level of journaling to the features of the ext2 file system.     Xia: The successor to the Minix file system. The Linux implementation allows Linux and Minim [Author: Minix?]to share files.     Umsdos: A Linux version of the DOS file system. This file system provides additional structures for supporting file ownership, and security information for DOS file systems.     Msdos: An implementation of the Microsoft DOS file system without the Linux extensions.     Vfat: A Linux implementation of the Windows FAT file system.     Proc: Refer to the UNIX file system section for information on the proc file system.     Smb: The Microsoft Server Message Block file system for Linux. This file system allows Linux to mount Microsoft SMB file systems.     Ncp: A Linux implementation of the Novel Client Protocol that allows Linux to mount Novel Netware file systems.     Iso9660: The Linux implementation of the ISO9660 file system used by most CDs.     Sysv: The Linux implementation of the original System V UNIX file system. Not used often.     Hpfs: The Linux implementation of the High Performance File System, allowing Linux to mount OS/2 hpfs partitions.     Affs: The Linux implementation of the Amiga fast file system that allows Linux and Amiga systems to share files.     Ufs: Refer to the UNIX file systems section for information on the ufs file system.
  13. The lines beginning with a pound sign (#) are considered comments and are used here to help delineate the various sections of the configuration information. The first two sections, beginning with the comments Database and Labels , describe the database routines and disk label types Volume Manager recognizes. These two sec­tions should not be modified. “ Devices to use” Section The third section, marked by the comment Devices to use , lists the names and types of the removable media devices Volume Manager should monitor. Each line in this section starts with the keyword use , as follows. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 The use keyword is followed by the type of device, either CD-ROM or floppy, and the keyword drive , as follows. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 Following the device type is the OS name for the device. Note that the CD-ROM device name specifies only the first five characters of the full special device name. Because Volume Manager will monitor and mount all available slices it finds on a CD-ROM disk, the only information items needed are the specific controller and target portions of the device name. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 Following the special device name is the name of the shared object used to manage the device. This must match the device type specified (e.g., if the device type is cdrom , the shared object must be dev_cdrom.so ). Finally, the symbolic name used in the /device directory is listed. The first device of a given type has a 0 (zero) appended to its name, whereas the second is appended with a 1, and so on. For instance, a second CD-ROM drive located at target 5 on the built-in SCSI con­troller would be placed under Volume Manager control by adding the following line to the devices section of the vold.conf file. use cdrom drive /dev/dsk/c0t5 dev_cdrom.so cdrom1 Actions Section The next section, which begins with the comment Actions , specifies the actions to be taken when certain events occur. The basic events are the insertion of media into a drive ( insert ), removal of media from a drive ( eject ), and notification of problems ( notify ). An example entry in the actions section follows. eject /vol*/dev/diskette[0-9]/* user=root /usr/sbin/rmmount Entry Content Each line lists an event followed by a regular expression. When an event occurs, each line that begins with the name of the event ( insert , eject , or notify ) is checked. If the volume on which the event occurs matches the regu­lar expression, the remainder of the action line comes into play. The remainder of this line includes the name of the user or group identification to be used to run the listed command with the listed arguments. In the previous example line, when the eject event occurs and the volume matches the regular expression /vol*/dev/dis­kette[0-9]/* , the command /usr/sbin/rmmount would be run with the root user permissions.
  14. The lines beginning with a pound sign (#) are considered comments and are used here to help delineate the various sections of the configuration information. The first two sections, beginning with the comments Database and Labels , describe the database routines and disk label types Volume Manager recognizes. These two sec­tions should not be modified. “ Devices to use” Section The third section, marked by the comment Devices to use , lists the names and types of the removable media devices Volume Manager should monitor. Each line in this section starts with the keyword use , as follows. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 The use keyword is followed by the type of device, either CD-ROM or floppy, and the keyword drive , as follows. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 Following the device type is the OS name for the device. Note that the CD-ROM device name specifies only the first five characters of the full special device name. Because Volume Manager will monitor and mount all available slices it finds on a CD-ROM disk, the only information items needed are the specific controller and target portions of the device name. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 Following the special device name is the name of the shared object used to manage the device. This must match the device type specified (e.g., if the device type is cdrom , the shared object must be dev_cdrom.so ). Finally, the symbolic name used in the /device directory is listed. The first device of a given type has a 0 (zero) appended to its name, whereas the second is appended with a 1, and so on. For instance, a second CD-ROM drive located at target 5 on the built-in SCSI con­troller would be placed under Volume Manager control by adding the following line to the devices section of the vold.conf file. use cdrom drive /dev/dsk/c0t5 dev_cdrom.so cdrom1 Actions Section The next section, which begins with the comment Actions , specifies the actions to be taken when certain events occur. The basic events are the insertion of media into a drive ( insert ), removal of media from a drive ( eject ), and notification of problems ( notify ). An example entry in the actions section follows. eject /vol*/dev/diskette[0-9]/* user=root /usr/sbin/rmmount Entry Content Each line lists an event followed by a regular expression. When an event occurs, each line that begins with the name of the event ( insert , eject , or notify ) is checked. If the volume on which the event occurs matches the regu­lar expression, the remainder of the action line comes into play. The remainder of this line includes the name of the user or group identification to be used to run the listed command with the listed arguments. In the previous example line, when the eject event occurs and the volume matches the regular expression /vol*/dev/dis­kette[0-9]/* , the command /usr/sbin/rmmount would be run with the root user permissions.
  15. The lines beginning with a pound sign (#) are considered comments and are used here to help delineate the various sections of the configuration information. The first two sections, beginning with the comments Database and Labels , describe the database routines and disk label types Volume Manager recognizes. These two sec­tions should not be modified. “ Devices to use” Section The third section, marked by the comment Devices to use , lists the names and types of the removable media devices Volume Manager should monitor. Each line in this section starts with the keyword use , as follows. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 The use keyword is followed by the type of device, either CD-ROM or floppy, and the keyword drive , as follows. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 Following the device type is the OS name for the device. Note that the CD-ROM device name specifies only the first five characters of the full special device name. Because Volume Manager will monitor and mount all available slices it finds on a CD-ROM disk, the only information items needed are the specific controller and target portions of the device name. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 Following the special device name is the name of the shared object used to manage the device. This must match the device type specified (e.g., if the device type is cdrom , the shared object must be dev_cdrom.so ). Finally, the symbolic name used in the /device directory is listed. The first device of a given type has a 0 (zero) appended to its name, whereas the second is appended with a 1, and so on. For instance, a second CD-ROM drive located at target 5 on the built-in SCSI con­troller would be placed under Volume Manager control by adding the following line to the devices section of the vold.conf file. use cdrom drive /dev/dsk/c0t5 dev_cdrom.so cdrom1 Actions Section The next section, which begins with the comment Actions , specifies the actions to be taken when certain events occur. The basic events are the insertion of media into a drive ( insert ), removal of media from a drive ( eject ), and notification of problems ( notify ). An example entry in the actions section follows. eject /vol*/dev/diskette[0-9]/* user=root /usr/sbin/rmmount Entry Content Each line lists an event followed by a regular expression. When an event occurs, each line that begins with the name of the event ( insert , eject , or notify ) is checked. If the volume on which the event occurs matches the regu­lar expression, the remainder of the action line comes into play. The remainder of this line includes the name of the user or group identification to be used to run the listed command with the listed arguments. In the previous example line, when the eject event occurs and the volume matches the regular expression /vol*/dev/dis­kette[0-9]/* , the command /usr/sbin/rmmount would be run with the root user permissions.